The present disclosure describes a system and method that identifies locations in source code files that are associated with particular web requests. The system generates a fingerprint for each web request based at least in part on the parameters of each HTTP request. By fingerprinting the properties of the source code that generates each HTTP request, web requests that are generated by executing the fingerprinted code can be traced back to specific source code files, and in some cases an exact line of code. In many examples, a webpage or an action on a webpage can be traced back to a line of source code that is associated with the request. This may allow a developer to find a software defect or security vulnerability by tracing web requests of a running application and then mapping suspect web requests back to corresponding lines of code.
|
6. A computer-implemented method comprising:
identifying a web service request;
determining a fingerprint for the web service request;
locating, within a source code file, a request instruction, the request instruction having a matching fingerprint that matches the fingerprint of the web service request; and
determining that the performance of executable code associated with the request instruction is a source of the web service request.
1. A system comprising:
one or more processors; and
memory that stores computer-executable instructions that, if executed, cause the system to implement one or more services, wherein the one or more services:
identify a web service request;
determine a first fingerprint for the web service request;
locate, within a source code file, a request instruction, the request instruction having a second fingerprint that matches the first fingerprint of the web service request; and
determine that performance of executable code associated with the request instruction is a source of the web service request.
13. A non-transitory computer-readable storage medium having stored thereon executable instructions that, as a result of being executed by one or more processors of a computer system, cause the computer system to at least:
identify a web service request;
determine a fingerprint for the web service request;
locate, within a source code file, a request instruction, the request instruction having a matching fingerprint that matches the fingerprint of the web service request; and
determine that the performance of executable code associated with the request instruction is a source of the web service request.
2. The system of
generate the second fingerprint based at least in part on a syntax of the request instruction in the source code file; and
generate the first fingerprint based at least in part on a function signature of the web service request.
3. The system of
identify a set of parameters of the web service request; and
determine the function signature of the web service request based at least in part on the set of parameters.
4. The system of
generate a source code index by storing a textual parameter string as a respective keyword associated with the source code file, the respective keyword usable for matching a search query term to the source code file.
5. The system of
generate metadata associated with the source code file, wherein generating the metadata includes:
determining first metadata information corresponding to a software package associated with the source code file, the software package including executable software built at least in part from the source code file;
determining second metadata information corresponding to a computing environment, the computing environment including at least one host system running at least one service where the software package is deployed as part of a running instance of the at least one service; and
storing the metadata associated with the source code file as part of the source code index.
7. The computer-implemented method of
receiving a second source code file associated with a second application;
identifying a second request statement in the second source code file;
determining at least one second request parameter in the second source code file, the at least one second request parameter associated with the second request statement;
determining whether at least one existing keyword matches the at least one second request parameter; and
associating the at least one existing keyword to the second source code file.
8. The computer-implemented method of
parsing the source code file to locate a match of a respective request statement at a line of code in the source code file, the respective request statement being in accordance with syntax of a programming language used in the source code file.
9. The computer-implemented method of
analyzing the request instruction located at a line of code in the source code file to identify at least one request parameter that is included as part of the request instruction; and
assigning a keyword corresponding to the at least one request parameter, the keyword to be associated with at least the source code file to facilitate searching the source code file.
10. The computer-implemented method of
11. The computer-implemented method of
12. The computer-implemented method of
14. The non-transitory computer-readable storage medium of
receive a second source code document associated with source code for a second application;
identify a second request statement in the second source code document;
determine at least one second request parameter in the second source code document, the at least one second request parameter associated with the second request statement;
determine whether at least one existing keyword matches the at least one second request parameter; and
associate the at least one existing keyword to the second source code document.
15. The non-transitory computer-readable storage medium of
parse the source code file to locate a match of a respective request statement at a line of code in the source code file, the respective request statement being in accordance with syntax of a programming language used in the source code file.
16. The non-transitory computer-readable storage medium of
analyze the request instruction located at a line of code in the source code file to identify at least one request parameter that is included as part of the request instruction; and
assign a keyword corresponding to the at least one request parameter, the keyword to be associated with at least the source code file to facilitate searching the source code file.
17. The non-transitory computer-readable storage medium of
18. The non-transitory computer-readable storage medium of
19. The non-transitory computer-readable storage medium of
20. The non-transitory computer-readable storage medium of
the fingerprint identifies a combination of one or more parameters at a location in the source code file; and
the location in the source code file is associated with instructions that, if executed, process the web service request.
|
This application is a continuation of U.S. patent application Ser. No. 14/579,184, filed on Dec. 22, 2014, the disclosure of which is incorporated herein by reference in its entirety.
Applications including software services and Web services (“services”) provide a way to access software functionality that can be reused for a variety of purposes by different clients. Services are usually provided by a server or other entity and are accessed by clients remotely over a network connection, such as a local area network (LAN), a wide area network (WAN), the Internet, etc. Further, a service may provide an application programming interface (API) that can be used by users to access functionality provided by the service.
Various embodiments in accordance with the present disclosure will be described with reference to the drawings, in which:
In the following description, various embodiments will be illustrated by way of example and not by way of limitation in the figures of the accompanying drawings. References to various embodiments in this disclosure are not necessarily to the same embodiment, and such references mean at least one. While specific implementations and other details are discussed, it is to be understood that this is done for illustrative purposes only. A person skilled in the relevant art will recognize that other components and configurations may be used without departing from the scope and spirit of the claimed subject matter.
Many companies and other organizations operate computer networks that interconnect numerous computing systems to support their operations, such as with the computing systems being co-located (e.g., as part of a local network) or instead located in multiple distinct geographical locations (e.g., connected via one or more private or public intermediate networks). For example, distributed systems housing significant numbers of interconnected computing systems have become commonplace. Such distributed systems may provide back-end services to Web servers that interact with clients. Such distributed systems may also include data centers that are operated by entities to provide computing resources to customers.
However, as the scale and scope of distributed systems have increased, the tasks of provisioning, administering, and managing the resources have become increasingly complicated. Further, the development environment for a large, enterprise software application that run on such distributed systems may have a very large number of source code components stored in a source code repository. In addition, these source code components may have been modified multiple times throughout the evolution of the software application and present a challenge to tracking code that introduce new bugs or unwanted behavior throughout the software application.
As further shown in
In an embodiment, the development workstations 104 may be a personal computer (“PC”), a desktop workstation, a laptop, a notebook, mobile computing device, phablet, tablet computer, a personal digital assistant (“PDA”), an electronic-book reader, a game console, a set-top box, a consumer electronics device, a server computer, or any other computing device capable of connecting to the network 106 and communicating with the software development system 110. The network 106 may be a local-area network (“LAN”), a wide-area network (“WAN”), the Internet, and/or any other networking topology or combination of topologies that connects the development workstations 104 to the software development system 110. The software development system 110 may include application servers, database servers, Web servers, and other computing and storage devices that provide development lifecycle services to the development personnel 102. The software development system 110 may be implemented by a company or organization to provide development lifecycle services to development personnel 102, or the software development system 110 may be implemented in “the cloud” to provide services to a variety of organizations across the Internet and/or other networks 106.
In at least one embodiment, the software development system 110 includes one or more source code repositories 112. The source code repositories 112 stores source code 114 including source code components of application software system(s). For example, the source code 114 may represent source code components including source code documents, files, modules, object definitions, methods, functions, groups or lines of code, or any combination of these and other types of source code components. In an embodiment, one or more source code components may be bundled together into a software package (“package” or “packages”). A package may then be further bundled into a package group that is deployed The source code repositories 112 may further store change history and revisions to the source code 114, software revision and version labels or version control information, code dependencies, build scripts, and the like for the software systems. The source code repositories 112 may be maintained by a source code control and build system 116. The source code control and build system 116 may be a component of a software configuration management system (not shown) or may also be a proprietary system implemented by the software development system 110.
For example, software development personnel 102 may utilize the source code control and build system 116 to “check-in” a code change 118 into the source code repositories 112. The code change 118 may comprise a new source code 114, or may represent a change to an existing source code in the source code repositories 112. The software development personnel 102 may utilize the source code control and build system 116 to check-out a code artifact from the source code repositories 112, modify a portion of the code, and then check-in the modified code. In one embodiment, the source code control and build system 116 tracks the individual code changes 118 made to the source code 114 in the source code repositories 112 through the use of a specific identifier, such as a change list number (“CLN”). In addition, the CLN may be utilized to identify individual code changes 118 throughout the development lifecycle, including code review, testing, build and deployment, and operation in the production environment. The source code repositories 112 may further maintain the relationships between code changes 118 and any associated source code 114. The source code control and build system 116 may then build corresponding source code for an application or service (e.g., one of services 150a, 150b or 150c) into executable code that is deployable to one or more host systems for execution. A deployment and configuration management system 130 organizes deployable software (e.g., built executable code) into packages, package groups, and environments. In an embodiment, to track changes over time, packages may be identified by versions and can be grouped together into version-sets using version filters. In an embodiment, the deployment and configuration management system 130 can communicate with the source control and build system 116 to deploy built versions of one or more applications.
In an embodiment, the software development system 110 includes a preprocessor 120 that including fingerprinting logic 122 that performs indexing of the source code 114 to identify parameters of GET and POST request (e.g., HTTP requests) statements and different types of metadata information for the source code 114, among other types of information. By producing an index 124 of source code (stored in the source code repositories 112) that is isolated to the parameters of GET and POST request statements, “fingerprinting” specific actions will allow those actions to be traced to specific source code files, and in many cases the exact line of code. A fingerprint as used herein refers to a combination of parameters or a single instance of a parameter at a specific location in source code. The process of “fingerprinting” as used herein may refer to determining, by the fingerprinting logic 122 of the preprocessor 120, parameter(s) of a HTTP request statement and/or metadata for associating with a keyword in the index of source code (e.g., “source code index”) where the keyword comprises the parameter. For example, a fingerprinting algorithm used for fingerprinting may map an arbitrarily large set of data (e.g., source code) to a much smaller set of data, its “fingerprint,” that uniquely identifies or associates the large set of data to the smaller set of data. Further a keyword corresponding to the parameter may then be mapped to the fingerprint.
Thus, an advantage is that any web page, and any action on that web page from an HTTP request, can be traced back to the exact line of source code that is accepting that request. In an example, this will enable the capability to find a software defect or security vulnerability while looking at a running application and mapping the software defect or security vulnerability back directly to the line of code that needs to be modified (e.g., the HTTP request statement in accordance with the syntax of the programming language used in a given source code document). As used herein, a statement may refer to the smallest standalone element of a programming language which expresses some action to be carried out (e.g., the HTTP request). Further, the aforementioned metadata included as part of a respective fingerprint may include information pertaining to the programming language(s) for the source code, a package that includes the source code, a package group that includes the package, and/or a computing environment in which the package or package group was deployed as part of a running instance of the application or service, among other types of metadata.
In an embodiment, a source code search engine 140 may receive search requests and perform searches on the index 124 based on input from a user or another application (e.g., a security or auditing service). The source code search engine may return search results including keywords from the index 124 that match search query terms from the search requests. In the case of a collision between two or more source code files, the source code search engine 140 may use the aforementioned metadata included in the index 124 in order to further filter search results. As an example, a dedicated website such as “mhbt123XYZ.com” can be traced to specific packages, which include a set of source code files that have been built. By filtering on these smaller number of packages, the potential for collisions is greatly reduced.
The source code index may enable searches conducted across a plurality of source code documents, such as source code documents 210 and 230, in the source code repositories 112. These documents may be represented in the index 124 by respective data structures, such as corresponding fingerprint data structures illustrated by example in
Turning to the data structures for the source code documents in more detail,
As shown, the fingerprint data structure 211a includes a request type field 212a representing a POST or GET HTTP request type, a URL field 213a representing the URL that was requested, and a parameter field 214a for one or more parameters that were included as part of the request. Other fields may be included in the fingerprint data structure 211a and still be within the scope of the subject technology. For example, a field for a one or more HTTP headers included in the request may be part of the fingerprint data structure 211a. In an example, HTTP headers may include additional information or parameters, including, for example, authorization strings or keys, a host name, a content type, a type of client, cookie information, among other types of information.
Additionally, the fingerprint data structure 211a may include metadata information 216a corresponding to the source code document 210. As shown, the fingerprint data structure 211a includes a package 217a field representing a respective software package in which a built version of the source code document is included, a package group 218a field representing a group of packages that the package represented by the package 217a field, a field for an environment 219a, an application framework 221a that corresponds to what was used in the source code document 210, a package owner 222a corresponding to a user or group or domain or website, etc., and a programming language 223a corresponding to the language used in the source code document 210. As referred to herein, the phrase “application framework” may refer to software libraries, extensions, etc., that have a URL redirect functionality in which the URL redirect functionality determines a structure of a URL pattern for invoking such URL redirect functionality. For example, for a PHP application framework, a URL pattern in accordance to the URL redirect functionality of the PHP application framework may be defined in a first way, but in a JAVA application framework, a URL pattern may be defined differently in the JAVA application framework in comparison. Other metadata fields may be included in the fingerprint data structure 211a and still be within the scope of the subject technology. For example, a field for a line number(s) in the source document 210 indicating the location of the URL 213a or the parameters 214a may be included in the fingerprint data structure 211a. In another embodiment, information pertaining to a user that last modified or “checked-in” changes to the source code document may be provided and included in the metadata.
One or more keywords 220a corresponding to the fingerprint data structure 211a are then generated by the preprocessor 120a based at least in part on the parameters 214a. Such keywords facilitate searching the source code document 210 by matching query terms in a search request to the keyword(s), which would result in the source code document 210 being returned, in this example, as a search result. The fingerprint data structure 211a and the keywords(s) 220 may be stored in the index 124.
As further shown in
As understood, these examples of different fields are given only for ease of discussion, but not to limit implementations of the description herein. Other fields may be included without departing from the scope of the subject technology. Moreover, it is appreciated that not all fields discussed with respect to a fingerprint data structure is required to be included as shown in the example of
The source code repositories 112 may include additional source code documents for a given application, and therefore other source code documents, such as source code document 230, may be represented in data structures. The source code document 230, however, may be written is a different programming language than the source code document 210 described before, and as a result, a different preprocessor 120n, corresponding to that programming language, may use its fingerprinting logic 122n to determine request statements and identify parameters in the source code document 230. In this example, a fingerprint data structure 231a may represent the source code document 230 and contain fields and contents similar to those shown for the fingerprint data structures 211b and 211b as discussed above. As illustrated, the fingerprint data structure 231a includes a request type field 232a representing a POST or GET HTTP request type, a URL field 233a representing the URL that was requested, and a parameter field 234a for one or more parameters that were included as part of the request in the source code document 230. Further, fingerprint data structure 231a may also include metadata information 236a corresponding to the source code document 230. As shown, the fingerprint data structure 231a includes a package 237a field representing a respective software package in which a built version of the source code document is included, a package group 238a field representing a group of packages that the package represented by the package 237a field, a field for an environment 239a, an application framework 241a that corresponds to what was used in the source code document 230, a package owner 242a corresponding to a user or group or domain or website, etc., and a programming language 243a corresponding to the language used in the source code document 210. One or more keywords 240a corresponding to the fingerprint data structure 231a are then generated by the preprocessor 120n based at least in part on the parameters 234a. The keywords 240a facilitate searching the source code document 230 by matching query terms in a search request to the keywords. The fingerprint data structure 231a and the keywords(s) 240a may be stored in the index 124.
As shown, the source code portion 310 includes a HTTP request statement 320 at a particular line of code, in accordance with the syntax of a programming language, which invokes a HTTP GET request of a web site at a HTTP address (“http://http123XYZ.org/get”). The preprocessor 120 may identify that the portion of the HTTP request statement 320 corresponds to a request parameter 322. In this example, based on the syntax of the programming language, the preprocessor 120 determines that the string “payload” represents the value of the request parameter for the HTTP request statement 320. In an embodiment, the preprocessor 120 may then look throughout the source code portion 310 to find whether the string “payload” may include another statement that further defines other request parameters for the HTTP request statement 320. At another line of code, an assignment statement assigns a string corresponding to a parameter “payload” 324 to additional request parameters 326. Thus, an example fingerprint of the source code portion 310 may have request parameters corresponding to “key1” and “key2” be associated with the HTTP request statement 320. The request parameters “key1” and “key2” can further be used as keywords to facilitate searching of the source code portion 310 and to determine the line of code where the HTTP request statement 320 is included in the source code document that contains the source code portion 310.
As shown in another example, the source code portion 350 includes a HTTP request statement 360 at a particular line of code, in accordance with the syntax of a programming language, which invokes a HTTP POST request of a web site at a HTTP address (“https://XYZ123.com”). The preprocessor 120 may identify that the portion of the HTTP request statement 360 corresponds to a request parameter 362. In this example, based on the syntax of the programming language, the preprocessor 120 determines that the string “request_parameters” represents the value of the request parameter for the HTTP request statement 360. In an embodiment, the preprocessor 120 may then look throughout the source code portion 350 to find whether the string “request_parameters” may include another statement(s) that further defines other request parameters for the HTTP request statement 360. At another line of code, an assignment statement assigns a string corresponding to a parameter “request_parameters” 364 to additional request parameter 366. At yet another line of code, an addition assignment statement (“+=”) assigns a string corresponding to a parameter “request_parameters” 368 to additional request parameter 370. An example fingerprint of the source code portion 350 may have request parameters corresponding to “param1” and “param2” be associated with the HTTP request statement 360. The request parameters “param1” and “param2” can therefore be used as keywords to facilitate searching of the source code portion 350 and to determine the line of code where the HTTP request statement 360 is included in the source code document that contains the source code portion 350.
As shown, the source code portion 380 includes a HTTP request statement 381 at a particular line of code, in accordance with the syntax of a programming language, which invokes a HTTP request for checking parameters for a username and password to determine whether the submitted credentials are valid. The preprocessor 120 may identify that the portion of the HTTP request statement 320 that includes a request for a “valid_login” function with request parameters 386 and 388. In this example, based on the syntax of the programming language, the preprocessor 120 determines that the string “username” and “password’ represents respective request parameters for the “valid_login” function included in the HTTP request statement 381. In an embodiment, the preprocessor 120 may then look throughout the remaining portion of source code portion 380 to find another HTTP request statement. In this example, a second HTTP request statement 382 for a “log_the_user_in” function is determined by the preprocessor 120, and a request parameter 384 for the “log_the_user_in” function is determined to be included in the HTTP request statement 381. Thus, an example fingerprint of the source code portion 380 may have request parameters corresponding to “username” and “password” be associated with the HTTP request statement 381 and/or the request parameter corresponding to “username” be associated with the HTTP request statement 382. The request parameters “username” and “password” can further be used as keywords to facilitate searching of the source code portion 380 and to determine the respective lines of code where the HTTP request statement 381 and/or 382 are included in the source code document that contains the source code portion 380.
At step 402, at least one source code document associated with source code for an application is received. The source code document is to be indexed into an index file where the at least one source code document includes at least one request parameter and at least one HTTP request statement associated with the at least one request parameter. At step 404, a HTTP request statement is identified in a portion of the at least one source code document. The HTTP request statement is associated with a programming language used in the at least one source code document. In an embodiment, identifying the HTTP request statement includes parsing the at least one source code document to find a match of a respective HTTP request statement that is specific to syntax of the programming language used in the at least one source code document. A pattern matching algorithm is used to find the match by matching one or more patterns specific to the syntax of the programming language that correspond to the respective HTTP request statement in an example.
At step 406, it is determined whether at least a first request parameter is in the at least one source code document where the first request parameter associated with the HTTP request statement. In an embodiment, determining the at least first request parameter includes parsing the HTTP request statement to identify at least one request parameter that is included as part of the HTTP request statement, parsing the at least one source code document to identify a second portion of the at least one source code document that includes a second statement, the second statement defining the at least one request parameter based at least in part on syntax specific to the programming language, and extracting a textual parameter string corresponding to the at least one request parameter based at least in part on the second statement.
At step 408, a determination is made whether an existing keyword exists in a source code index. If not, at step 410, at least one keyword associated with the at least one source code document is created in the source code index based at least in part on the at least the first request parameter, and the at least one keyword includes the at least the first request parameter. In this manner, generating a source code index can be based at least in part on the at least the first request parameter associated with the HTTP request statement. Creating at least one keyword in the source code index further includes storing the textual parameter string in the source code index as a respective keyword associated with at least one source code document, the respective keyword used for matching a search query term to the at least one source code document in an example. Alternatively, if an existing keyword does exist at step 408, at step 414 the existing keyword is associated with the source code document in the source code index.
At step 412, it is determined whether another HTTP request statement is identified in the source code document. If so, the process 400 continues to step 406 to repeat the subsequent steps. Otherwise, the process 400 may end.
At step 502, a search query is received including one or more search query terms corresponding to request parameters. At step 504, a source code index is searched based on search query. Based on search results, at step 506, it is determined whether a collision of search results has occurred (e.g., where too many search results are returned corresponding to the request parameters). If so, at step 508, metadata associated at least in part with a web page including the request parameters may be used to reduce search results. Such metadata, as discussed before, may include information pertaining to a package, group of packages and/or environment in which the package is deployed. By filtering search results to match such metadata, a number of search results may be reduced to provide more relevant results. In an example where a search query is looking for multiple parameters, first metadata associated with results for a first parameter and second metadata for a second parameter may be combined in order to further filter out search results. At step 510, search results corresponding to request parameters are provided. If no collision is determined at step 506, alternatively, at step 510, search results corresponding to request parameters are provided without using the metadata described previously in step 508.
As discussed, different approaches can be implemented in various environments in accordance with the described embodiments. For example,
The illustrative environment includes at least one application server 708 and a data store 710. It should be understood that there can be several application servers, layers or other elements, processes or components, which may be chained or otherwise configured, which can interact to perform tasks such as obtaining data from an appropriate data store. As used herein, the term “data store” refers to any device or combination of devices capable of storing, accessing and retrieving data, which may include any combination and number of data servers, databases, data storage devices and data storage media, in any standard, distributed or clustered environment. The application server 708 can include any appropriate hardware and software for integrating with the data store 710 as needed to execute aspects of one or more applications for the client device and handling a majority of the data access and business logic for an application. The application server provides access control services in cooperation with the data store and is able to generate content such as text, graphics, audio and/or video to be transferred to the user, which may be served to the user by the Web server 706 in the form of HTML, XML or another appropriate structured language in this example. The handling of all requests and responses, as well as the delivery of content between the client device 702 and the application server 708, can be handled by the Web server 706. It should be understood that the Web and application servers are not required and are merely example components, as structured code discussed herein can be executed on any appropriate device or host machine as discussed elsewhere herein.
The data store 710 can include several separate data tables, databases or other data storage mechanisms and media for storing data relating to a particular aspect. For example, the data store illustrated includes mechanisms for storing content (e.g., production data) 712 and user information 716, which can be used to serve content for the production side. The data store is also shown to include a mechanism for storing log or session data 714. It should be understood that there can be many other aspects that may need to be stored in the data store, such as page image information and access rights information, which can be stored in any of the above listed mechanisms as appropriate or in additional mechanisms in the data store 710. The data store 710 is operable, through logic associated therewith, to receive instructions from the application server 708 and obtain, update or otherwise process data in response thereto. In one example, a user might submit a search request for a certain type of item. In this case, the data store might access the user information to verify the identity of the user and can access the catalog detail information to obtain information about items of that type. The information can then be returned to the user, such as in a results listing on a web page that the user is able to view via a browser on the user device 702. Information for a particular item of interest can be viewed in a dedicated page or window of the browser.
Each server typically will include an operating system that provides executable program instructions for the general administration and operation of that server and typically will include computer-readable medium storing instructions that, when executed by a processor of the server, allow the server to perform its intended functions. Suitable implementations for the operating system and general functionality of the servers are known or commercially available and are readily implemented by persons having ordinary skill in the art, particularly in light of the disclosure herein.
The environment in one embodiment is a distributed computing environment utilizing several computer systems and components that are interconnected via computing links, using one or more computer networks or direct connections. However, it will be appreciated by those of ordinary skill in the art that such a system could operate equally well in a system having fewer or a greater number of components than are illustrated in
As discussed above, the various embodiments can be implemented in a wide variety of operating environments, which in some cases can include one or more user computers, computing devices, or processing devices which can be used to operate any of a number of applications. User or client devices can include any of a number of general purpose personal computers, such as desktop or laptop computers running a standard operating system, as well as cellular, wireless, and handheld devices running mobile software and capable of supporting a number of networking and messaging protocols. Such a system also can include a number of workstations running any of a variety of commercially-available operating systems and other applications for purposes such as development and database management. These devices also can include other electronic devices, such as dummy terminals, thin-clients, gaming systems, and other devices capable of communicating via a network.
Various aspects also can be implemented as part of at least one service or Web service, such as may be part of a service-oriented architecture. Services such as Web services can communicate using any appropriate type of messaging, such as by using messages in extensible markup language (XML) format and exchanged using an appropriate protocol such as SOAP (derived from the “Simple Object Access Protocol”). Processes provided or executed by such services can be written in any appropriate language, such as the Web Services Description Language (WSDL). Using a language such as WSDL allows for functionality such as the automated generation of client-side code in various SOAP frameworks.
Most embodiments utilize at least one network for supporting communications using any of a variety of commercially-available protocols, such as TCP/IP, FTP, UPnP, NFS, and CIFS. The network can be, for example, a local area network, a wide-area network, a virtual private network, the Internet, an intranet, an extranet, a public switched telephone network, an infrared network, a wireless network, and any combination thereof.
In embodiments utilizing a Web server, the Web server can run any of a variety of server or mid-tier applications, including HTTP servers, FTP servers, CGI servers, data servers, Java servers, and business application servers. The server(s) also may be capable of executing programs or scripts in response requests from user devices, such as by executing one or more Web applications that may be implemented as one or more scripts or programs written in any programming language, such as Java®, C, C# or C++, or any scripting language, such as Perl, Python, or TCL, as well as combinations thereof. The server(s) may also include database servers, including without limitation those commercially available from Oracle®, Microsoft®, Sybase®, and IBM®.
The environment can include a variety of data stores and other memory and storage media as discussed above. These can reside in a variety of locations, such as on a storage medium local to (and/or resident in) one or more of the computers or remote from any or all of the computers across the network. In a particular set of embodiments, the information may reside in a storage-area network (“SAN”). Similarly, any necessary files for performing the functions attributed to the computers, servers, or other network devices may be stored locally and/or remotely, as appropriate. Where a system includes computerized devices, each such device can include hardware elements that may be electrically coupled via a bus, the elements including, for example, at least one central processing unit (CPU), at least one input device (e.g., a mouse, keyboard, controller, touch screen, or keypad), and at least one output device (e.g., a display device, printer, or speaker). Such a system may also include one or more storage devices, such as disk drives, optical storage devices, and solid-state storage devices such as random access memory (“RAM”) or read-only memory (“ROM”), as well as removable media devices, memory cards, flash cards, etc.
Such devices also can include a computer-readable storage media reader, a communications device (e.g., a modem, a network card (wireless or wired), an infrared communication device, etc.), and working memory as described above. The computer-readable storage media reader can be connected with, or configured to receive, a computer-readable storage medium, representing remote, local, fixed, and/or removable storage devices as well as storage media for temporarily and/or more permanently containing, storing, transmitting, and retrieving computer-readable information. The system and various devices also typically will include a number of software applications, modules, services, or other elements located within at least one working memory device, including an operating system and application programs, such as a client application or Web browser. It should be appreciated that alternate embodiments may have numerous variations from that described above. For example, customized hardware might also be used and/or particular elements might be implemented in hardware, software (including portable software, such as applets), or both. Further, connection to other computing devices such as network input/output devices may be employed.
Storage media and other non-transitory computer readable media for containing code, or portions of code, can include any appropriate storage media used in the art, such as but not limited to volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules, or other data, including RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disk (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the a system device. Based on the disclosure and teachings provided herein, a person of ordinary skill in the art will appreciate other ways and/or methods to implement the various embodiments.
The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense. It will, however, be evident that various modifications and changes may be made thereunto without departing from the broader spirit and scope of the invention as set forth in the claims.
Lakkakula, Narasimha Rao, Carmack, Scott Gerard, Bellucci, Daniele
Patent | Priority | Assignee | Title |
10956436, | Apr 17 2018 | International Business Machines Corporation | Refining search results generated from a combination of multiple types of searches |
Patent | Priority | Assignee | Title |
20120323940, | |||
20140279851, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Jan 28 2015 | BELLUCCI, DANIELE | Amazon Technologies, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 044139 | /0140 | |
Mar 11 2015 | CARMACK, SCOTT GERARD | Amazon Technologies, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 044139 | /0140 | |
Nov 13 2017 | LAKKAKULA, NARASIMHA RAO | Amazon Technologies, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 044139 | /0140 | |
Nov 15 2017 | Amazon Technologies, Inc. | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
Nov 15 2017 | BIG: Entity status set to Undiscounted (note the period is included in the code). |
Dec 27 2022 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Date | Maintenance Schedule |
Jun 25 2022 | 4 years fee payment window open |
Dec 25 2022 | 6 months grace period start (w surcharge) |
Jun 25 2023 | patent expiry (for year 4) |
Jun 25 2025 | 2 years to revive unintentionally abandoned end. (for year 4) |
Jun 25 2026 | 8 years fee payment window open |
Dec 25 2026 | 6 months grace period start (w surcharge) |
Jun 25 2027 | patent expiry (for year 8) |
Jun 25 2029 | 2 years to revive unintentionally abandoned end. (for year 8) |
Jun 25 2030 | 12 years fee payment window open |
Dec 25 2030 | 6 months grace period start (w surcharge) |
Jun 25 2031 | patent expiry (for year 12) |
Jun 25 2033 | 2 years to revive unintentionally abandoned end. (for year 12) |